Logo - springer
Slogan - springer

Engineering - Signals & Communication | Ubiquitous Information Technologies and Applications - CUTE 2013

Ubiquitous Information Technologies and Applications

CUTE 2013

Jeong, Y.-S., Park, Y.-H., Hsu, C.-H.(., Park, J.J.(.H. (Eds.)

2014, XXIV, 854 p. 514 illus.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-642-41671-2

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-642-41670-5

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

  • Reflects the state-of-the-art of the computational methods, involving theory, algorithm, numerical simulation, error and uncertainty analysis
  • Provides a multidiscipline focus with appeal to researchers, engineers and computer scientists
  • Promotes discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing
The theme of CUTE is focused on the various aspects of ubiquitous computing for advances in ubiquitous computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ubiquitous computing. Therefore this book will be include the various theories and practical applications in ubiquitous computing

Content Level » Research

Keywords » Ad-hoc Networking - CUTE 2013 - Computer Imaging and Graphics - Energy-aware System - Formal Verification - Future Internet - Intelligence Grid Platform - Intelligent Sensor Network - Intelligent Web Service - Next-generation Internet - Open Service Architecture - Optical Networks - U-Health Care System - Ubiquitous Multicasting - Ubiquitous Networking - Ubiquitous Wireless Networks

Related subjects » Communication Networks - Information Systems and Applications - Signals & Communication

Table of contents 

Ubiquitous Communication and Networking.- Ubiquitous wired and wireless networks.- Ad-hoc networking.- Intelligent sensor network/RFID.- Ubiquitous/pervasive platform and middleware.- Automated, adapted and situated service.- Open service architecture.- Intelligent web service.- Mobile and ubiquitous multicasting.- Next-generation Internet & IPv6.- Mobile network (NGN/BcN).- Wireless communication technology.- Optical networks.- Home networks.- Future Internet.- Ubiquitous Software Technology.- Context-aware acquisition and representation.- Context-aware media processing.- Context database/management.- Context framework and middleware.- Context analysis and utilization.- Context/Location-aware application.- Energy-aware system.- Resource-aware computation.- Self-aware computers and systems.- Ubiquitous Systems and Applications.- Distributed ubiquitous middleware.- Ubiquitous intelligent applications.- Ubiquitous intelligent systems.- Intelligence grid platform and service.- U-Health care system.- Smart appliances and wearable devices.- Haptic interfaces and interactions.- Design principles for multimodal systems.- Auditory and haptic displays.- Multimodal gaming and entertainment.- Novel systems and interactions using other modalities (e.g. taste, smell).- Computer imaging and graphics<.- Ubiquitous learning.- Ubiquitous Security, Privacy and Trust.- Information security and cryptography.- Security services/mechanisms/protocols in network/system levels.- Access control in network/system levels.- Identity, privacy, and trust issues in ubiquitous society.- Risk estimation and management.- Formal verification for security services & mechanisms/protocols.- Performance analysis for security services & mechanisms/protocols.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Communications Engineering, Networks.